[2] Evian Lee, Li Renfa. PFM: an SMS4 algorithm against high-order power attack. Journal of Communication, 20 10/0,31(5): 87-92. Including EI.
[3] Evian Lee, Li Renfa, Zou Yi. Research on quantitative model of anti-power attack ability of cryptographic algorithm chip. Journal of Hunan University, 20 10/0,37 (3): 73-76. Including EI.
Evian Lee, Li Renfa. Simplified second-order differential power consumption attack method using fixed value mask and its defense measures. Microcomputer system, 20 10/0,31(9):1894-1898.
Evian Lee, Li Renfa. Differential power attack on SMS4 encryption algorithm. Computer Science, 20 10/0,37 (7): 39-41.
Evian Lee, Li Renfa, Li Jing. Research on an efficient experimental platform for electric power attack physics. Computer Science, 20 10/0,37 (6): 75-77.
, Li Renfa, Xu. Research and application of an efficient power consumption model in power consumption attack experiment. Research on Computer Application, 26, 2009 (12): 4722-4723.
Evian Lee, Li Renfa. Summary of research on security SoC against power consumption attack. Computer Science, 2009, 36(6): 16- 18.
Evian Lee, Li Renfa. A summary of research on hybrid systems. Research on Computer Application, 2008,25 (8): 2255-2259.
[10], Li Renfa, Jiao. Research on anti-power attack of an ECC encryption chip. Microelectronics and Computer, 20 1 1, 28 (1): 27-30.
Evian Lee, Li Renfa. Learn from world-class universities and explore advanced curriculum structures. Computer Education, 2008, 5:23-26.
[12], Xu, Wei Shudi. Research and implementation of simulation experimental platform for packet interception. Journal of Hengyang Teachers College, 29, 2008 (3): 97-101.
Evian Lee. Research on the present situation of classroom teaching in colleges and universities and the improvement of teaching effect. Journal of Hengyang Normal University, 20 10/0,6
[14] Evian Lee, Li Kenli, Jiao Cr, Zou Yi. Research on physical power attack experimental platform based on AT89C5 1. Research on Computer Application, 2012,29 (7): 2681-2682. core
[15] Evian Lee, Liu Yang, Li Kenli, et al. Research on ECC bypass attack method of elliptic curve cryptosystem. Computer application research, 20 13. 3.
Li Lang, Li Kenli. Anti-DPA algorithm in trusted computing system. LNCS。 20 13.6。 Engineering index